AWERProcedia Information Technology & Computer Science

Size: px
Start display at page:

Download "AWERProcedia Information Technology & Computer Science"

Transcription

1 AWERProcedia Information Technology & Computer Science 1 (2012) nd World Conference on Information Technology (WCIT-2011) EigenCoin: sassanid coins classification based on Bhattacharyya distance Rahele Allahverdi a *, Mohammad Mahdi Dehshibi a, Azam Bastanfard b, Daryoosh Akbarzadeh c a Department of Electrical, Computer and IT, Islamic Azad University, Qazvin Branch, Iran b Department of Computer Engineering, Islamic Azad University, Karaj Branch, Iran c National Museum of Iran, Tehran, Iran Abstract Solving pattern recognition problems using imbalanced databases is a hot topic, which entices researchers to bring it into focus. Therefore, we consider this problem in the application of Sassanid coins classification. Our focus is not only on proposing EigenCoin manifold with Bhattacharyya distance for the classification task, but also on testing the influence of the holistic and feature-based approaches. EigenCoin consists of three main steps namely manifold construction, mapping test data, and classification. Conducted experiments show EigenCoin outperformed other observed algorithms and achieved the accuracy from 9.45% up to 21.75%, while it has the capability of handling the over-fitting problem. Keywords: EigenCoin, Sassanid Coin Classification, Bhattacharyya distance, Over-fitting; Selection and peer review under responsibility of Prof. Dr. Hafize Keser Academic World Education & Research Center. All rights reserved. 1. Introduction In recent years, much research has been devoted to make the pattern recognition algorithms applicable and solve the real world problems. Many desired applications such as biometric data analysis, medical image processing, quantifying industrial products, and optical/handwritten character recognition are highly demanded by this requirement. However, cultural heritage studies have been less taken into consideration due to several *ADDRESS FOR CORRESPONDENCE : Rahele, Allahverdi, Department of Electrical, Computer and IT, Islamic Azad University, Qazvin Branch, Iran mohammad.dehshibi@ieee.org

2 R. Allahverdi et al./ AWERProcedia Information Technology & Computer Science (2012) constraints including imbalanced distribution of data and limited number of the suitable data in which the illumination, occlusion and intra-class variations observe carefully. Ancient coins classification is a branch of cultural heritage study, which its automation has advantages of reducing the processing time and increasing the processing speed and accuracy. Moreover, as the great majority of the stolen coins are sold through the Internet and manual tracking of this trade is fairly impossible, utilizing pattern recognition methods for analyzing such coins is a necessity. As it is mentioned above, problems related to the data set are causal factors for decreasing the number of researches in this area. In [1], different local descriptors are applied to the coins images by Kampel et al. and it was observed in the course of experiments that SIFT descriptor has the capability of producing a promising result on the coins classification. Arandjelovic *2+ also investigates the SIFT descriptor for recognizing Roman s coins; however, the end result would seem to indicate that this method is inaccurate and its recognition rate is about 2.4%. With a view to the visual words and utilizing locally biased directional histogram based visual codebooks, Arandjelovic can achieve the recognition rate of 57% in Roman s coin classification. Although the latter work conducted experiments on a database with 65 classes and examined different features for comparing the end results, it is similar to the Kampel work in performing local features and the experiments are not reproducible. The reason is that the detail of feature s parameters and data distributions corresponded to bet ween/within classes are left in doubt. In addition to ancient coins, several works have been reported on classifying modern coins. For instance, Huber et al. [3] utilize Eigen analysis in order to construct a discriminative model which has the capability of classifying coins from their diameter and thickness. Another identification system for matching EURO coins is presented by Khashman et al. [4] in which a neural network is trained with images relating to the both side of EURO in different rotated positions. In *5+, angular and distance information of coin s edge image are encoded in histograms; then, a 3-nearest neighbor approach is utilized on two sides of the coin to construct a classification pilot so-called COIN-O-MATIC. In this paper, we investigate the problem of Sassanid coins classification with complicated patterns structure. With the aim of solving this problem, first, a set of training images is utilized to construct a discriminative model by means of Principal Component Analysis (PCA). PCA [16] is a dimensional reduction method, which extracts the most informative principal components of the multi-dimensional data and considers them as basis vectors for constructing a subspace, hereinafter referred to as the EigenCoin. Afterwards a test image is projected onto the EigenCoin and Bhattacharyya distances between its coefficients vector and those representing each training coin are computed. Then the test coin will associate with the minimum distance class. Finally, in order to compute the classification rate and get closer to the actual results, a new metric is defined which has the capability of overcoming the imbalanced distribution of images in the data set. With the aim of demonstrating the efficiency of the proposed method, two sets of experiments are conducted on Sassanid coin images. In the first set, different numbers of Eigenvectors with Bhattacharyya distance are examined in order to achieve the maximum recognition rate. In the second set, we compare proposed method together with the accuracy of three feature extraction and classification methods including Bi-Directional PCA (BDPCA) [6], Wavelet decomposition [7], and Harris corner detector [8]. These results would seem to indicate that the proposed method has the capability of being a pilot for ancient coin classification with chaotic patterns. The roadmap of this paper is as follows. In Section 2, the proposed method is described. Experimental results are presented in Section 3 and finally, the paper is concluded in Section Proposed Method In the first step, a coin is isolated from its background. Then 70% of data is utilized to construct EigenCoin space. Afterward a new images is mapped onto EigenCoin manifold and its distance with all manifold s member is calculated. Finally, if the result is less than a threshold, the image will be assigned to the class with the minimum distance. The overall process of the proposed method is illustrated in Fig

3 R. Allahverdi et al./ Procedia Information Technology & Computer Science (2012) Extracting Region of Interest Fig. 1. Procedure of the proposed method The contrast of the coin to be segmented differs greatly from the background, and gradient operators have the capability of detecting contrast changes in the image. Therefore, edge information from Sobel operator is utilized to obtain a binary mask which facilitates the segmentation process. The binary gradient mask highlights lines of high contrast in the image, although these lines do not quite delineate the outline of the coin. (a) (b) (c) Fig. 2. (a) Coin Image; (b) Edge information with threshold equals to 0.2; (c) Isolated regions In order to fill these gaps, the Sobel image is dilated using the vertical structuring elements followed by the horizontal structuring elements. At this stage, all holes, which may exist in each object, are filled through the utilization of morphological operators [9]. Fig 2 depicts how mentioned method effectively isolates regions of interest from the background. Images of ancient coins contain extra information that is coin s identification number. With a view to eliminate this information, which impacts on recognition process, a preprocessing procedure is required. As is evident from Fig. 2 (c), we isolate regions of interest with gradient information in which the end result is a binary image. Now, in order to extract the coin image and eliminate the numbers, the area related to each connected component is calculated and the element with the largest area is kept. 1153

4 R. Allahverdi et al./ AWERProcedia Information Technology & Computer Science (2012) (a) (b) Fig. 3. Extracting Region of Interest (ROI); (a) Binary image with different components; (b) extracted coin Fig 3 shows the end result of preprocessing step, in which the coin is isolated from other parts of the image EigenCoin The aim of this study is to recognize the class of ancient coins in which the Eigen analysis is applied to a set, S, of M vectorized coin images to construct a manifold of size N. Here, N is the product of the rows and columns of a normalized coin image, x. S = {x 1, x 2,..., x M } (1) Afterward the mean image ( ) and the difference between the input image and the mean image (Φ) will be calculated as follows: (2) Subsequent to calculating the mean image, a set of K Eigenvectors, which sum of their Eigenvalues covers the maximum energy, are chosen to construct EigenCoin. The k th Eigenvector, u k, is chosen such that: max s.t. (3) where u i and are the i th Eigenvector and Eigenvalue, respectively. In recognition step, an input image is projected onto the EigenCoin space and in order to find out its weight with respect to other basis vectors of this manifold, the difference between input image and the mean image gets multiplied by each Eigenvector (4): (4) It is worth pointing out in this context that the fundamental difference between standard Eigenfeature method [10] and proposed one is in calculating Bhattacharyya distance instead of Euclidian distance for the 1154

5 R. Allahverdi et al./ Procedia Information Technology & Computer Science (2012) recognition step. It is evident that each vector in EigenCoin space is a multivariate Gaussian distribution and Bhattacharyya distance is calculated as beneath: (5) where respectively. is the Bhattacharyya distance, m i, and P i are the mean and covariance of the distributions, 3. Experimental Results In order to demonstrate the performance of the proposed method, two sets of experiments are conducted. In the first set, different numbers of Eigenvector with Bhattacharyya distance are examined in order to achieve the maximum recognition rate. In the second set, EigenCoin is compared with Bi-Directional PCA, Wavelet Decomposition, and Harris corner detector which utilizes Bhattacharyya distance as recognition metric. As it is mentioned above, we face the problem of imbalanced data, which causes over-fitting disorder. To solve this and to show the performance of EigenCoin, two measurements are computed which are defined as follows below: With the purpose of evaluating the over-fitting problem of PCA, normalized mean-square error (MSE) is computed with the result that the MSE is minimal. Given the first K Eigenvectors, we can obtain the corresponding projector and represent the reconstructed vector as: (6) The MSE on the training set is defined as: (7) where is the ith training samples, is the reconstructed vector of, and is the mean vector of all training samples. To overcome the imbalanced data problem, a weighted metric for calculating the precision of classifiers is defined. In this metric, recognition rate of each class gives multiply by a coefficient and the overall recognition rate is obtained as follows: (8) where and are the ith coefficient and recognition rate, respectively Data Set We conduct our experiments on Sassanid coins images database. This data set consists of 1288 color images in JPEG format with the resolution of pixels. These images are distributed in four classes and each 1155

6 R. Allahverdi et al./ AWERProcedia Information Technology & Computer Science (2012) class belongs to a Sassanid king. Although each class contains images of both sides of each coin, it should be noted that just obverse images are utilized in the conducted experiments. As is evident in Fig 4, all images subject to preprocessing due to printed demographic data. (a) (b) (c) (d) Fig. 4. Sassanid Coins of (a) Hormozd IV, (b) Hormozd V, (c) Khosrow I, (d) Khosrow II. Coins can be split up into five fundamental elements which are: (1) King s bust, (2) rim(s), (3) three star-moon patterns placed at the sides of coins (4) legends, and (5) a crown pattern at top of king's head Regulation coefficient and distribution of coins in each class are tabulated in Table 1. Table 1. Distribution of coins in each class, size of training and testing sets, and King Name Training Number Testing Number Overall Khosrow I Khosrow II Hormozd IV Hormozd V EigenCoin and Bhattacharyya distance In this experiment, Eigen analysis with different Eigenvectors is applied to the 451 training vectorized images to construct EigenCoin. Afterwards each testing image is mapped onto new manifold and assigned to a class utilizing Bhattacharyya distance. With the aim of achieving the best classification accuracy, different number of Eigenvectors is tested and the best result is obtained in a situation in which the number of Eigenvectors is 112. Fig 5 (a) would seem to indicate the overall classification accuracy with respect to various numbers of Eigenvectors. In Fig 5 (b) the mean score error with respect to the different Eigenvectors number is shown and the confusion matrix is illustrated in Fig 5 (c). (a) (b) 1156

7 R. Allahverdi et al./ Procedia Information Technology & Computer Science (2012) (c) Fig. 5. (a) Classification accuracy; (b) MSE; (c) Confusion Matrix It should be noted that there is a tradeoff between the number of Eigenvectors and computational time. Indeed, the optimal value of Eigenvectors can be obtained on the basis of trials with the result that guarantees both classification accuracy and computational complexity. As is obvious from Fig 5 (a), classification results of images which are related to Khosrow II have significant difference with the result of other classes. The reason is that the distribution of data in the mentioned class is in a way that the constructed manifold lacks the ability to recognized images from other classes. To solve this problem, we utilize the defined precision metric (8) and achieve a reasonable precision. Table 2 shows accuracy of coin classification with respect to different Eigenvectors. In order to save space in this table, just eight highest precisions are tabulated. Table 2. Accuracy of coin classification with respect to different Eigenvectors. C i is an acronym for the name of a class Eigenvector Accuracy (%) C C C C Overall Competitive methods In order to evaluate the proposed method and demonstrate its efficiency, accuracy of EigenCoin is compared with three state of the art feature extraction and object classification methods. These competitive methods are Bi-Directional PCA (BDPCA) with Assembled Matrix Distance (AMD) [6], Wavelet decomposition [7], and Harris corner detector [8] with Bhattacharyya distance Bi-Directional PCA and Assembled Matrix Distance There is a fundamental difference between PCA and BDPCA in analyzing and extracting the feature of interest. BDPCA preserves the structure of data, i.e., the input data should not be vectorized. In this method, two transformations so-called row and column scatter matrices are utilized to extract directly the feature matrix. In recognition step, a kind of matrix norm called Assembled Matrix Distance is performed on the testing data t o classify it properly. In order to evaluate the BDPCA in the coin classification problem, six pairs of row and column scatter matrices are investigated. The best result is obtained through the utilization of 15 rows and 35 columns which is 19.54%. Refer to Fig 6 for more details. 1157

8 R. Allahverdi et al./ AWERProcedia Information Technology & Computer Science (2012) Fig. 6. Accuracy of BDPCA with different number of features in comparison with EigenCoin As is obvious in Figure 6, when the number of rows and columns of the scatter matrix increase, the overall accuracy decreases. In contrast, the proposed method provides reasonably high recognition rate also on those occasions in which the number of feature vectors increases Wavelet and Bhattacharyya Distance Wavelet decomposition is a non-linear transformation with the advantage over other non-linear ones for which both frequency and location information are captured simultaneously. This transformation is worked by means of a low pass and band pass filter. The low pass filter constructs the approximate image and the band pass filter constructs details images. In the conducted experiment, four levels of decomposition with Haar filter are observed along which feature vectors with 5, 17, 65, and 257 entries are obtained. The first and second entries of each feature vector relates to the mean and standard deviation of approximate image while the other entries are the standard deviation of details images. After constructing feature vector, the Bhattacharyya distance is utilized to calculate the distance between test image and each training ones. Finally, the entry with minimum distance leads the recognition step to find the proper class of a test image. The accuracy of coin classification with this method is tabulated in Table 3. Table 3. Accuracy of Wavelet and EigenCoin methods with different numbers of features Number of Features Wavelet accuracy (%) EigenCoin accuracy (%) As is clear in this table, even the feature vector with size of 257 has not the capability of EigenCoin in identifying the class of input images Harris Corner Detector and Bhattacharyya Distance It is reported by Arandjelovic [2] that local feature descriptors such as Harris [8], SUSAN [11], Hough transform [12], SIFT [13], SURF [14], and GLOH [15] have the capability of classifying ancient coins better than other investigated methods in modern coins. Harris corner detector considers the differential of the corner score with respect to its direction. This operator applies Eigen analysis to a matrix which expresses the gradient distribution of a point s neighbors and computes the magnitude of Eigenvalues. Then, a corner will be detected 1158

9 R. Allahverdi et al./ Procedia Information Technology & Computer Science (2012) in the event that there are two large positive Eigenvalues at a point. Results of applying Harris corner detector are shown in Fig. 7. Fig. 7. Results of applying Harris corner detector In the conducted experiment, the feature vector consists of corner point s intensity. It was observed in the experiments that the feature vector has the dimension between 103 and 184. After extracting the feature vector, Bhattacharyya distance between a new image and those that construct the feature space is calculated for using in classification task. The detection percent related to each class and overall accuracy are tabulated in Table 4. As is evident, the overall accuracy is 18.81% which is not comparable with the best result of EigenCoin method, nonetheless the classification results of Hormozd IV is fairly better than the proposed method. Table 4. Classification result of applying Harris corner detector. Here, D is an abbreviation for dimensional. 4. Conclusion Class Method Hormozd IV Khosrow I Khosrow II Hormozd V Overall Harris (184D) 37.93% 12.5% 74.83% 0% 18.82% EigenCoin (112D) 24.1% 31.2% 75.5% 0% 21.75% In recent years, much research has been devoted to the automation of pattern recognition applications; however, few have harnessed the cultural heritage applications. In fact, it seems that the causal factor relates to the problems of existing databases, i.e., small sample size, imbalanced data, etc. In this paper, we explored EigenCoin, new manifold for Sassanid coin classification. Continuing with this rationale, our methodology for classifying ancient coins is obviously promising in imbalanced data set in which we conducted our experiments on it. In EigenCoin, first, we choose 70% of data and apply Eigen analysis to the isolated coins in order to construct a manifold. Afterwards, a number of Eigenvectors are chosen based on their Eigenvalue to construct EigenCoin space. Along these same lines, we map each test image onto EigenCoin and calculate Bhattacharyya distance between the test image and all train images. Finally, based on the obtained distances, the test coin will be assigned to one of four predefined classes, i.e., Khosrow I, Khosrow II, Hormozd IV, and Hormozd V. In order to demonstrate the accuracy and efficiency of the proposed method, we tested not only different numbers of Eigenvectors and calculated different normalized mean square errors, but also investigated the effect of Bi- Directional PCA, Wavelet decomposition, and Harris Corner detector. It was observed in the course of experiments that the EigenCoin outperformed other examined methods and achieved the accuracy from 9.45% up to 21.75%. Furthermore, results of calculating normalized mean-square error prove that EigenCoin has the capability of handling the over-fitting problem in the imbalanced Sassanid coin database. In our opinion, it is not an unjustifiable assumption that the classification rate of each class is reported separately. Therefore, a metric is defined to balance the overall accuracy percentage. References [1]. M. Kampel, M. Zaharieva, Recognizing Ancient Coins Based on Local Features, Lecture Notes in Computer Science, Vol. 5358, 2008, pp

10 R. Allahverdi et al./ AWERProcedia Information Technology & Computer Science (2012) [2]. O. Arandjelovic, Automatic attribution of ancient Roman imperial coins. in: Proceedings of the 23th IEEE Co nference on Computer Vision and Pattern Recognition (CVPR), 2010, pp [3]. R. Huber, H. Ramoser, K. Mayer, H. Penz, M. Rubik, Classification of coins using an Eigenspace approach, Pattern Recognitio n Letters 26(1) (2005) [4]. A. Khashman, B. Sekeroglu, K. Dimililer, Intelligent Coin Identification System, in: Proceedings of the 21th IEEE International Symposio m on Intelligent Control, 2006, pp [5]. L. Van Der Maaten, P. Poon, Coin-o-matic: A fast system for reliable coin classification, in: Muscle CIS Coin Competition Workshop, 2006, pp [6]. W. Zuo, D. Zhang, J. Yang, K. Wang, BDPCA plus LDA: A Novel Fast Feature Extraction Technique for Face Recognition, IEEE Tr ansactions on Systems Man and Cybernetics Part B 36(4) (2006) [7]. C. Garcia, G. Zikos, G. Tziritas, A wavelet-based framework for face recognition, in: Proceedings of European Conference on Computer Vision, 2008, pp [8]. C. Harris, M. Stephens, A combined corner and edge detector, in: Proceedings of the 4th Alvey Vision Conference, 1988, pp [9]. P. Soille, Morphological Image Analysis: Principles and Applications, Springer, Heidelberg, [10]. M. Turk, A. Pentland, Eigenfaces for recognition, Journal of Cognitive Neuroscience 3(1) (1991) [11]. S. M. Smith, J. M. Brady, SUSAN - a new approach to low level image processing, International Journal of Computer Vision 23 (1) (1997) [12]. P.V.C. Hough, Machine Analysis of Bubble Chamber Pictures, in: Proceedings of Internati onal Conference on High Energy Accelerators and Instrumentation, 1999, pp [13]. D. G. Lowe, Object recognition from local scale-invariant features, in: Proceedings of thr 7th IEEE International Conference on Computer Vision,1999, pp [14]. H. Bay, T. Tuytelaars, L. Van Gool, SURF: Speeded Up Robust Features, Computer Vision and Image Understanding (CVIU) 110(3) (2008) [15]. K. Mikolajczyk, C. Schmid, A performance evaluation of local descriptors, IEEE Transactions on Pattern An alysis and Machine Intelligence 10(27) (2005) [16]. I.T. Jolliffe, Principal Component Analysis, 2nd ed. Series: Springer Series in Statistics, XXIX,

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Adaptive Face Recognition System from Myanmar NRC Card

Adaptive Face Recognition System from Myanmar NRC Card Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Object Recognition and Template Matching

Object Recognition and Template Matching Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of

More information

COIN-O-MATIC: A fast system for reliable coin classification

COIN-O-MATIC: A fast system for reliable coin classification COIN-O-MATIC: A fast system for reliable coin classification e-mail: L.J.P. van der Maaten P.J. Boon MICC-IKAT, Universiteit Maastricht P.O. Box 616, 6200 MD Maastricht, The Netherlands telephone: (+31)43-3883901

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control. Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,

More information

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Face Recognition in Low-resolution Images by Using Local Zernike Moments Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie

More information

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,

More information

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data

Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data CMPE 59H Comparison of Non-linear Dimensionality Reduction Techniques for Classification with Gene Expression Microarray Data Term Project Report Fatma Güney, Kübra Kalkan 1/15/2013 Keywords: Non-linear

More information

The use of computer vision technologies to augment human monitoring of secure computing facilities

The use of computer vision technologies to augment human monitoring of secure computing facilities The use of computer vision technologies to augment human monitoring of secure computing facilities Marius Potgieter School of Information and Communication Technology Nelson Mandela Metropolitan University

More information

SYMMETRIC EIGENFACES MILI I. SHAH

SYMMETRIC EIGENFACES MILI I. SHAH SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms

More information

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.

More information

AN EFFICIENT HYBRID REAL TIME FACE RECOGNITION ALGORITHM IN JAVA ENVIRONMENT ABSTRACT

AN EFFICIENT HYBRID REAL TIME FACE RECOGNITION ALGORITHM IN JAVA ENVIRONMENT ABSTRACT AN EFFICIENT HYBRID REAL TIME FACE RECOGNITION ALGORITHM IN JAVA ENVIRONMENT M. A. Abdou*, M. H. Fathy** *Informatics Research Institute, City for Scientific Research and Technology Applications (SRTA-City),

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Determining optimal window size for texture feature extraction methods

Determining optimal window size for texture feature extraction methods IX Spanish Symposium on Pattern Recognition and Image Analysis, Castellon, Spain, May 2001, vol.2, 237-242, ISBN: 84-8021-351-5. Determining optimal window size for texture feature extraction methods Domènec

More information

Visualization of Large Font Databases

Visualization of Large Font Databases Visualization of Large Font Databases Martin Solli and Reiner Lenz Linköping University, Sweden ITN, Campus Norrköping, Linköping University, 60174 Norrköping, Sweden Martin.Solli@itn.liu.se, Reiner.Lenz@itn.liu.se

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service

siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service siftservice.com - Turning a Computer Vision algorithm into a World Wide Web Service Ahmad Pahlavan Tafti 1, Hamid Hassannia 2, and Zeyun Yu 1 1 Department of Computer Science, University of Wisconsin -Milwaukee,

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Vision based Vehicle Tracking using a high angle camera

Vision based Vehicle Tracking using a high angle camera Vision based Vehicle Tracking using a high angle camera Raúl Ignacio Ramos García Dule Shu gramos@clemson.edu dshu@clemson.edu Abstract A vehicle tracking and grouping algorithm is presented in this work

More information

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

Medical Image Segmentation of PACS System Image Post-processing *

Medical Image Segmentation of PACS System Image Post-processing * Medical Image Segmentation of PACS System Image Post-processing * Lv Jie, Xiong Chun-rong, and Xie Miao Department of Professional Technical Institute, Yulin Normal University, Yulin Guangxi 537000, China

More information

A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow

A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow , pp.233-237 http://dx.doi.org/10.14257/astl.2014.51.53 A Study on SURF Algorithm and Real-Time Tracking Objects Using Optical Flow Giwoo Kim 1, Hye-Youn Lim 1 and Dae-Seong Kang 1, 1 Department of electronices

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

Low-resolution Image Processing based on FPGA

Low-resolution Image Processing based on FPGA Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,

More information

Fast Matching of Binary Features

Fast Matching of Binary Features Fast Matching of Binary Features Marius Muja and David G. Lowe Laboratory for Computational Intelligence University of British Columbia, Vancouver, Canada {mariusm,lowe}@cs.ubc.ca Abstract There has been

More information

Incremental PCA: An Alternative Approach for Novelty Detection

Incremental PCA: An Alternative Approach for Novelty Detection Incremental PCA: An Alternative Approach for Detection Hugo Vieira Neto and Ulrich Nehmzow Department of Computer Science University of Essex Wivenhoe Park Colchester CO4 3SQ {hvieir, udfn}@essex.ac.uk

More information

Probabilistic Latent Semantic Analysis (plsa)

Probabilistic Latent Semantic Analysis (plsa) Probabilistic Latent Semantic Analysis (plsa) SS 2008 Bayesian Networks Multimedia Computing, Universität Augsburg Rainer.Lienhart@informatik.uni-augsburg.de www.multimedia-computing.{de,org} References

More information

Build Panoramas on Android Phones

Build Panoramas on Android Phones Build Panoramas on Android Phones Tao Chu, Bowen Meng, Zixuan Wang Stanford University, Stanford CA Abstract The purpose of this work is to implement panorama stitching from a sequence of photos taken

More information

CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER

CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER TECHNICAL SCIENCES Abbrev.: Techn. Sc., No 15(2), Y 2012 CATEGORIZATION OF SIMILAR OBJECTS USING BAG OF VISUAL WORDS AND k NEAREST NEIGHBOUR CLASSIFIER Piotr Artiemjew, Przemysław Górecki, Krzysztof Sopyła

More information

Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

More information

Results of the MUSCLE CIS Coin Competition 2006

Results of the MUSCLE CIS Coin Competition 2006 Results of the MUSCLE CIS Coin Competition 2006 Michael Nölle 1 and Michael Rubik 2 1 Video and Safety Technology, 2 High Performance Image Processing ARC Seibersdorf research GmbH, A-2444 Seibersdorf

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

A Comparative Study between SIFT- Particle and SURF-Particle Video Tracking Algorithms

A Comparative Study between SIFT- Particle and SURF-Particle Video Tracking Algorithms A Comparative Study between SIFT- Particle and SURF-Particle Video Tracking Algorithms H. Kandil and A. Atwan Information Technology Department, Faculty of Computer and Information Sciences, Mansoura University,El-Gomhoria

More information

Poker Vision: Playing Cards and Chips Identification based on Image Processing

Poker Vision: Playing Cards and Chips Identification based on Image Processing Poker Vision: Playing Cards and Chips Identification based on Image Processing Paulo Martins 1, Luís Paulo Reis 2, and Luís Teófilo 2 1 DEEC Electrical Engineering Department 2 LIACC Artificial Intelligence

More information

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras W3A.5 Douglas Chai and Florian Hock Visual Information Processing Research Group School of Engineering and Mathematics Edith

More information

Character Image Patterns as Big Data

Character Image Patterns as Big Data 22 International Conference on Frontiers in Handwriting Recognition Character Image Patterns as Big Data Seiichi Uchida, Ryosuke Ishida, Akira Yoshida, Wenjie Cai, Yaokai Feng Kyushu University, Fukuoka,

More information

Low-resolution Character Recognition by Video-based Super-resolution

Low-resolution Character Recognition by Video-based Super-resolution 2009 10th International Conference on Document Analysis and Recognition Low-resolution Character Recognition by Video-based Super-resolution Ataru Ohkura 1, Daisuke Deguchi 1, Tomokazu Takahashi 2, Ichiro

More information

Blood Vessel Classification into Arteries and Veins in Retinal Images

Blood Vessel Classification into Arteries and Veins in Retinal Images Blood Vessel Classification into Arteries and Veins in Retinal Images Claudia Kondermann and Daniel Kondermann a and Michelle Yan b a Interdisciplinary Center for Scientific Computing (IWR), University

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

Canny Edge Detection

Canny Edge Detection Canny Edge Detection 09gr820 March 23, 2009 1 Introduction The purpose of edge detection in general is to significantly reduce the amount of data in an image, while preserving the structural properties

More information

ScienceDirect. Brain Image Classification using Learning Machine Approach and Brain Structure Analysis

ScienceDirect. Brain Image Classification using Learning Machine Approach and Brain Structure Analysis Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 50 (2015 ) 388 394 2nd International Symposium on Big Data and Cloud Computing (ISBCC 15) Brain Image Classification using

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Local features and matching. Image classification & object localization

Local features and matching. Image classification & object localization Overview Instance level search Local features and matching Efficient visual recognition Image classification & object localization Category recognition Image classification: assigning a class label to

More information

Accurate and robust image superresolution by neural processing of local image representations

Accurate and robust image superresolution by neural processing of local image representations Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica

More information

A Simple Feature Extraction Technique of a Pattern By Hopfield Network

A Simple Feature Extraction Technique of a Pattern By Hopfield Network A Simple Feature Extraction Technique of a Pattern By Hopfield Network A.Nag!, S. Biswas *, D. Sarkar *, P.P. Sarkar *, B. Gupta **! Academy of Technology, Hoogly - 722 *USIC, University of Kalyani, Kalyani

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

Review Jeopardy. Blue vs. Orange. Review Jeopardy

Review Jeopardy. Blue vs. Orange. Review Jeopardy Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?

More information

A comparative study on face recognition techniques and neural network

A comparative study on face recognition techniques and neural network A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University mrahma12@masonlive.gmu.edu In modern times, face

More information

Nonlinear Iterative Partial Least Squares Method

Nonlinear Iterative Partial Least Squares Method Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

Signature Segmentation from Machine Printed Documents using Conditional Random Field

Signature Segmentation from Machine Printed Documents using Conditional Random Field 2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition

More information

THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS

THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS THREE DIMENSIONAL REPRESENTATION OF AMINO ACID CHARAC- TERISTICS O.U. Sezerman 1, R. Islamaj 2, E. Alpaydin 2 1 Laborotory of Computational Biology, Sabancı University, Istanbul, Turkey. 2 Computer Engineering

More information

Classifying Manipulation Primitives from Visual Data

Classifying Manipulation Primitives from Visual Data Classifying Manipulation Primitives from Visual Data Sandy Huang and Dylan Hadfield-Menell Abstract One approach to learning from demonstrations in robotics is to make use of a classifier to predict if

More information

Fuzzy based Pixel wise Information Extraction for Face Recognition

Fuzzy based Pixel wise Information Extraction for Face Recognition Fuzzy based Pixel wise Information Extraction for Face Recognition Virendra P. Vishwakarma, Member, IACSIT, Sujata Pandey, Member, IEEE and M. N. Gupta Abstract This paper brings out a new approach of

More information

Galaxy Morphological Classification

Galaxy Morphological Classification Galaxy Morphological Classification Jordan Duprey and James Kolano Abstract To solve the issue of galaxy morphological classification according to a classification scheme modelled off of the Hubble Sequence,

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling

Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling David Bouget, Florent Lalys, Pierre Jannin To cite this version: David Bouget, Florent Lalys, Pierre Jannin. Surgical

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

CODING MODE DECISION ALGORITHM FOR BINARY DESCRIPTOR CODING

CODING MODE DECISION ALGORITHM FOR BINARY DESCRIPTOR CODING CODING MODE DECISION ALGORITHM FOR BINARY DESCRIPTOR CODING Pedro Monteiro and João Ascenso Instituto Superior Técnico - Instituto de Telecomunicações ABSTRACT In visual sensor networks, local feature

More information

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set

EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set Amhmed A. Bhih School of Electrical and Electronic Engineering Princy Johnson School of Electrical and Electronic Engineering Martin

More information

Principal Component Analysis

Principal Component Analysis Principal Component Analysis ERS70D George Fernandez INTRODUCTION Analysis of multivariate data plays a key role in data analysis. Multivariate data consists of many different attributes or variables recorded

More information

Palmprint Recognition with PCA and ICA

Palmprint Recognition with PCA and ICA Abstract Palmprint Recognition with PCA and ICA Tee Connie, Andrew Teoh, Michael Goh, David Ngo Faculty of Information Sciences and Technology, Multimedia University, Melaka, Malaysia tee.connie@mmu.edu.my

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

Management Science Letters

Management Science Letters Management Science Letters 4 (2014) 905 912 Contents lists available at GrowingScience Management Science Letters homepage: www.growingscience.com/msl Measuring customer loyalty using an extended RFM and

More information

Automatic Detection of PCB Defects

Automatic Detection of PCB Defects IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.

More information

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM Rohan Ashok Mandhare 1, Pragati Upadhyay 2,Sudha Gupta 3 ME Student, K.J.SOMIYA College of Engineering, Vidyavihar, Mumbai, Maharashtra,

More information

Signature verification using Kolmogorov-Smirnov. statistic

Signature verification using Kolmogorov-Smirnov. statistic Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,mbeal@cse.buffalo.edu

More information

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika

More information

The Big Data mining to improve medical diagnostics quality

The Big Data mining to improve medical diagnostics quality The Big Data mining to improve medical diagnostics quality Ilyasova N.Yu., Kupriyanov A.V. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. The

More information

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Mean-Shift Tracking with Random Sampling

Mean-Shift Tracking with Random Sampling 1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of

More information

Unsupervised and supervised dimension reduction: Algorithms and connections

Unsupervised and supervised dimension reduction: Algorithms and connections Unsupervised and supervised dimension reduction: Algorithms and connections Jieping Ye Department of Computer Science and Engineering Evolutionary Functional Genomics Center The Biodesign Institute Arizona

More information

CLOUD CHARACTERIZATION USING LOCAL TEXTURE INFORMATION. Antti Isosalo, Markus Turtinen and Matti Pietikäinen

CLOUD CHARACTERIZATION USING LOCAL TEXTURE INFORMATION. Antti Isosalo, Markus Turtinen and Matti Pietikäinen CLOUD CHARACTERIZATION USING LOCAL TEXTURE INFORMATION Antti Isosalo, Markus Turtinen and Matti Pietikäinen Machine Vision Group Department of Electrical and Information Engineering University of Oulu,

More information

Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report

Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 269 Class Project Report Automatic 3D Reconstruction via Object Detection and 3D Transformable Model Matching CS 69 Class Project Report Junhua Mao and Lunbo Xu University of California, Los Angeles mjhustc@ucla.edu and lunbo

More information

High-Performance Signature Recognition Method using SVM

High-Performance Signature Recognition Method using SVM High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of

More information

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks

A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks A Spectral Clustering Approach to Validating Sensors via Their Peers in Distributed Sensor Networks H. T. Kung Dario Vlah {htk, dario}@eecs.harvard.edu Harvard School of Engineering and Applied Sciences

More information

Computer Vision Based Employee Activities Analysis

Computer Vision Based Employee Activities Analysis Volume 03 Issue 05, September 2014 Computer Vision Based Employee Activities Analysis Md. Zahangir Alom, Nabil Tahmidul Karim, Shovon Paulinus Rozario *, Md. Rezwanul Hoque, Md. Rumman Bin Ashraf, Saikat

More information

Footwear Print Retrieval System for Real Crime Scene Marks

Footwear Print Retrieval System for Real Crime Scene Marks Footwear Print Retrieval System for Real Crime Scene Marks Yi Tang, Sargur N. Srihari, Harish Kasiviswanathan and Jason J. Corso Center of Excellence for Document Analysis and Recognition (CEDAR) University

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

Machine Learning for Data Science (CS4786) Lecture 1

Machine Learning for Data Science (CS4786) Lecture 1 Machine Learning for Data Science (CS4786) Lecture 1 Tu-Th 10:10 to 11:25 AM Hollister B14 Instructors : Lillian Lee and Karthik Sridharan ROUGH DETAILS ABOUT THE COURSE Diagnostic assignment 0 is out:

More information

Principal components analysis

Principal components analysis CS229 Lecture notes Andrew Ng Part XI Principal components analysis In our discussion of factor analysis, we gave a way to model data x R n as approximately lying in some k-dimension subspace, where k

More information

Manifold Learning Examples PCA, LLE and ISOMAP

Manifold Learning Examples PCA, LLE and ISOMAP Manifold Learning Examples PCA, LLE and ISOMAP Dan Ventura October 14, 28 Abstract We try to give a helpful concrete example that demonstrates how to use PCA, LLE and Isomap, attempts to provide some intuition

More information

Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers

Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers Algorithm for License Plate Localization and Recognition for Tanzania Car Plate Numbers Isack Bulugu Department of Electronics Engineering, Tianjin University of Technology and Education, Tianjin, P.R.

More information